adobe_flashplayer.exe

Installer

OOO Kod Intertainment

The application adobe_flashplayer.exe by OOO Kod Intertainment has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from readynewsoft.set2newupdate.website. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
OOO Kod Intertainment  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
c812cf72a0f44663a210b9f20c183f37

SHA-1:
c75d4ad36fc41e50ba0d4c0b0f88e4aa3961edc9

SHA-256:
c2db3122a897acbeaec63f425101d481bb06bb4234e5e4bdefeeced3198301e4

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
11/25/2024 1:48:37 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.OOOKodIn.Installer (M)
16.6.29.2

File size:
667.2 KB (683,200 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Installer.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_flashplayer.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/19/2015 5:00:00 PM

Valid to:
5/19/2016 4:59:59 PM

Subject:
CN=OOO Kod Intertainment, OU=Application Pool Insert, O=OOO Kod Intertainment, STREET="per. Sukharevski M., d. 9 str. 1 of. 36", L=Moscow, S=Moscow, PostalCode=127051, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009A10FA4B08D8CB4B3B790B1C419EB7B3

File PE Metadata
Compilation timestamp:
5/5/2016 1:07:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:jrV6aA54vJuir8PdNLt1fBc5kHAKicc76MzQJXEQLX4u8rijKdi2I97AhmFmSY9W:t6ab8D51pc5kgKm702o

Entry address:
0xA4CCE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.0220

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
651.5 KB (667,136 bytes)

The file adobe_flashplayer.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove adobe_flashplayer.exe - Powered by Reason Core Security